Practical Backdoor Attack Against Speaker Recognition System

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ISPEC (17. : 2022 : Taipeh) Information security practice and experience
1. Verfasser: Luo, Yuxiao (VerfasserIn)
Weitere Verfasser: Tai, Jianwei (VerfasserIn), Jia, Xiaoqi (VerfasserIn), Zhang, Shengzhi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios 2022 Zhao, Yang
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption 2022 Yuan, Jiaming
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities 2022 Perera, Maharage Nisansala Sevwandi
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs 2022 Ghafoori, Nasratullah
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey 2022 Fu, Guiwen
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems 2022 Tasopoulos, George
Detection of Adversarial Examples Based on the Neurons Distribution 2022 Zeng, Jiang-Yi
BADPASS: Bots Taking ADvantage of Proxy as a Service 2022 Chiapponi, Elisa
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems 2022 Huang, Yinqin
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response 2022 Christian, Juan
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry 2022 Talukder, Md Rakibul Hasan
Sherlock Holmes Zero-Knowledge Protocols 2022 Teşeleanu, George
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks 2022 Ermis, Orhan
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System 2022 Nguyen, Xuan-Ha
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection 2022 Mezawa, Yuki
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection 2022 Balan, Gheorghe
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks 2022 Nikbakht Bideh, Pegah
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT 2022 Halder, Subir
Continued Fractions Applied to a Family of RSA-like Cryptosystems 2022 Cotan, Paul
Practical Backdoor Attack Against Speaker Recognition System 2022 Luo, Yuxiao
Alle Artikel auflisten